Open rjtferreira opened 1 year ago
Hi @rjtferreira , thanks for the issue. I'm having trouble repro'ing this – curious if you still get any changes/ diffs now if you run pulumi up
, after the user correctly has both permissions?
Update: it looks like this non-determinism may be an upstream issue – we will track any fixes upstream.
hey @aq17 , thanks for spending the time on this.
I've been testing this locally with a PSQL docker image like this:
docker run -ti --rm --network host --name psql-pulumi -e POSTGRES_PASSWORD=passwd -e POSTGRES_INITDB_ARGS='--auth=scram-sha-256' postgres:13-alpine
We've also ran into the same issue when trying to apply our changes on GCP Cloud SQL on PostgreSQL 13.
curious if you still get any changes/ diffs now if you run pulumi up, after the user correctly has both permissions?
Indeed after the user has the correct permissions again after a refresh
and up
then any subsequent up
will show no changes :slightly_smiling_face:
What happened?
Hello,
I've noticed the other day after applying running
pulumi up
that a user we had on our database was left without the necessary permissions we had previously granted.I'm using a resource like this
If we add an additional table like so
objects: ['t1', 't2']
we notice that the user only has access tot2
. After this if we runpulumi refresh
followed bypulumi up
we get the desired permissions.Expected Behavior
The expected behavior is that when adding a new table to the list of objects we get the correct permissions for all tables listed and not just the ones that were newly added while the previous ones are removed.
Steps to reproduce
Here's the code I used
pulumi up
Grant
toobjects: ['t1', 't2'],
pulumi up
User has now lost access to
t1
Output of
pulumi about
Additional context
No response
Contributing
Vote on this issue by adding a 👍 reaction. To contribute a fix for this issue, leave a comment (and link to your pull request, if you've opened one already).